Vulnerability Description
AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a locale not using a dot floating point separator. Exploitation could allow remote code execution under the privileges of the InTouch View process.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aveva | Intouch 2014 | r2 |
| Aveva | Intouch 2017 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/104864Broken Link
- https://ics-cert.us-cert.gov/advisories/ICSA-18-200-02PatchPermissions RequiredThird Party Advisory
- https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LF
- http://www.securityfocus.com/bid/104864Broken Link
- https://ics-cert.us-cert.gov/advisories/ICSA-18-200-02PatchPermissions RequiredThird Party Advisory
- https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LF
FAQ
What is CVE-2018-10628?
CVE-2018-10628 is a vulnerability with a CVSS score of 9.8 (CRITICAL). AVEVA InTouch 2014 R2 SP1 and prior, InTouch 2017, InTouch 2017 Update 1, and InTouch 2017 Update 2 allow an unauthenticated user to send a specially crafted packet that could overflow the buffer on a...
How severe is CVE-2018-10628?
CVE-2018-10628 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-10628?
Check the references section above for vendor advisories and patch information. Affected products include: Aveva Intouch 2014, Aveva Intouch 2017.